Deployment overview for Synergis™ IX - Synergis™ IX 5.9

Synergis™ IX Deployment Guide 5.9

Applies to
Synergis™ IX 5.9
Last updated
Content type
Guides > Deployment guides
English (United States)
Synergis™ IX

You can deploy Synergis™ IX to manage both access control points and intrusion points in Security Center by following a sequence of steps.

The following table lists the tasks required for the deployment of Synergis™ IX after you have installed Security Center, and how to verify that the deployment is successful.
Step Task Where to find more information
Understand prerequisites and key issues before deploying
1 Learn about Synergis™ IX.
2 Before deploying Synergis™ IX in your system, read the release notes to learn about the new features, known issues, and limitations.
3 Ensure that your system software components are compatible with each other.
Prepare Security Center for Synergis™ IX deployment
4 Verify that your Security Center license has the required option and certificate for deploying Synergis™ IX.

Go to the Config Tool home page, click About > License > Synergis™, and confirm that Synergis™ IX is supported.

5 Create a model of the facilities protected by Security Center. You can do the following:
  • Create partitions to divide your system into smaller, manageable parts.
  • Create areas to represent your sites and buildings.
Installing the Synergis™ IX Web Enabled DIN Rail Controller
6 Install, or stage the installation of the Synergis™ IX hardware: controllers, expander modules, keypads, readers, and so on. Be sure to collect the following information:
  • Model and IP address of each controller
  • Model of the downstream modules connected to each controller
  • Login credentials (username and password) for each controller
  • Which inputs are linked to your intrusion detection areas and what outputs do they trigger when they are activated?
  • Which inputs are connected to the door sensors, REX, and manual stations?
  • Which outputs are connected to the door locks, buzzers, or push buttons?
  • Which doors are Card-in/Card-out and which are Card-in/REX-out?
Configure the Synergis™ IX controller through Synergis™ IX Portal
7 Configure the network settings for your Synergis™ IX controllers.
8 Configure the modules and readers connected to your Synergis™ IX controllers.
9 Configure the areas and inputs monitored by your Synergis™ IX controllers.
Configure the Synergis™ Cloud Link appliance through Synergis™ Appliance Portal
10 Prepare and configure the appliance, also called or .
11 Connect your Synergis™ IX controllers to the Synergis™ Cloud Link appliance.
Configure Security Center for access control and intrusion detection
12 Create the cardholders, credentials, and, optionally, badge templates.
NOTE: Cardholder groups, cardholders, and credentials must be created in Security Center. You can create them manually, or import them from a CSV file or from an Active Directory.
13 Create the schedules and the access rules for access control and intrusion detection.
14 Configure the role created by default.
NOTE: If you use keypads that can display cardholder names and you want the names to be displayed, enable the Include identifiable personal data in synchronization option.
15 Create the role.
NOTE: Unlike Access Manager roles, Intrusion Manager roles are not created by default.
16 Enroll the Synergis™ unit in Security Center.
17 Configure the Synergis™ IX settings for cardholders and cardholder groups.
18 Create the doors to the areas that you want to monitor and control, and configure the Synergis™ IX settings for these doors.
19 Configure the secured areas.
NOTE: Not all Security Center access control features are supported with the Synergis™ IX integration.
20 Configure the Synergis™ IX settings for intrusion detection.
NOTE: Intrusion detection areas are imported from controllers through the Synergis™ Cloud Link appliance.
21 Test your system using the various investigation and diagnostic tools available in Security Center and Synergis™ IX Portal.